SP 800-66 Rev. 1, Introductory Guide for Implementing the HIPAA Security Rule | CSRC
SP 800-66 Rev. 1
An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
Date Published: October 2008
Supersedes: SP 800-66 (03/01/2005)
Author(s)
Matthew Scholl (NIST), Kevin Stine (NIST), Joan Hash (NIST), Pauline Bowen (NIST), L. Johnson (NIST), Carla Smith (BAH), Daniel Steinberg (BAH)
Abstract
Special Publication 800-66 Rev. 1, An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule, which discusses security considerations and resources that may provide value when implementing the requirements of the HIPAA Security Rule, was written to help educate readers about information security terms used in the HIPAA Security Rule and to improve understanding of the meaning of the security standards set out in the Security Rule, direct readers to helpful information in other NIST publications on individual topics the HIPAA Security Rule addresses, and aid readers in understanding the security concepts discussed in the HIPAA Security Rule. This publication does not supplement, replace, or supersede the HIPAA Security Rule itself.
Keywords
HIPAA; security rule; Healthcare; Information Security
An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
Date Published: October 2008
Supersedes: SP 800-66 (03/01/2005)
Author(s)
Matthew Scholl (NIST), Kevin Stine (NIST), Joan Hash (NIST), Pauline Bowen (NIST), L. Johnson (NIST), Carla Smith (BAH), Daniel Steinberg (BAH)
Abstract
Special Publication 800-66 Rev. 1, An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule, which discusses security considerations and resources that may provide value when implementing the requirements of the HIPAA Security Rule, was written to help educate readers about information security terms used in the HIPAA Security Rule and to improve understanding of the meaning of the security standards set out in the Security Rule, direct readers to helpful information in other NIST publications on individual topics the HIPAA Security Rule addresses, and aid readers in understanding the security concepts discussed in the HIPAA Security Rule. This publication does not supplement, replace, or supersede the HIPAA Security Rule itself.
Keywords
HIPAA; security rule; Healthcare; Information Security